Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Dynamic monitoring model based on DPDK parallel communication
Cui LI, Qingkui CHEN
Journal of Computer Applications    2020, 40 (2): 335-341.   DOI: 10.11772/j.issn.1001-9081.2019081405
Abstract394)   HTML2)    PDF (846KB)(266)       Save

In order to make better use of the performance of communication system, make full use of the resources of system nodes, and improve the reliability and stability of the system, a dynamic monitoring model based on DPDK (Data Plane Development Kit) parallel communication was designed. Combined with the high speed, large traffic, strong real-time characteristics of DPDK and communication system, the model was designed for multi-node backup, data packet and control packet separation, transmitting and receiving data packets in parallel by multiple network ports, and processing data packets in parallel by multiple cores. The monitoring objects were analyzed, the data acquisition methods were researched, and a 2-layer communication protocol named DMPD was designed. The fine-grained monitoring was performed on the network ports, and the network port load information model was given. Besides, a more efficient and fair dynamic load balancing algorithm based on multi-network port was designed by combining hash function, adjustment function and dynamic load information. Experimental results show that the dynamic monitoring model can accurately detect and timely deal with the abnormality appeared in the system, and achieve the load balancing of multiple network ports.

Table and Figures | Reference | Related Articles | Metrics
Sentiment analysis on Web financial text based on semantic rules
WU Jiang TANG Chang-jie LI Taiyong CUI Liang
Journal of Computer Applications    2014, 34 (2): 481-485.  
Abstract880)      PDF (922KB)(1531)       Save
In order to effectively improve the accuracy of sentiment orientation and intensity analysis of unstructured Web financial text, a sentiment analysis algorithm for Web financial text based on semantic rule (SAFT-SR) was proposed. The algorithm extracted features of financial text based on Apriori, constructed financial sentiment lexicon and semantic rules to recognize sentiment unit and intensity, and figured out the sentiment orientation and intensity of text. Experiment results demonstrate that SAFT-SR is a promising algorithm for sentiment analysis on financial text. Compared with Ku’s algorithm, in sentiment orientation classification, SAFT-SR has better classification performance and increases F-measure, recall and precision; in sentiment intensity analysis, SAFT-SR reduces error and is closer to expert mark.
Related Articles | Metrics
Privacy protection method in vehicular networks
CUI Liqun ZHANG Mingjie
Journal of Computer Applications    2013, 33 (09): 2516-2519.   DOI: 10.11772/j.issn.1001-9081.2013.09.2516
Abstract504)      PDF (734KB)(423)       Save
Concerning the privacy protection problem in Vehicular Ad Hoc NETwork (VANET), a scheme based on K-anonymous chain privacy protection was proposed. The scheme built a k anonymous area near the query node and forwarded the minimum boundary rectangle containing the k vehicles as location data. The process of forwarding constructed an anonymous chain to confuse the corresponding relationship of identity information and location information, thus greatly reducing the probability of successful attack. Seen from the analysis of security and simulation experiment results, this scheme can well protect the privacy of mobile vehicles and improve the security and privacy of vehicular network communication.
Related Articles | Metrics
Cross-organizational workflow monitoring based on active workflow view
WANG Wei, CUI Li-zhen, WANG Hai-yang
Journal of Computer Applications    2005, 25 (05): 1202-1204.   DOI: 10.3724/SP.J.1087.2005.1202
Abstract1122)      PDF (162KB)(840)       Save
Cross-organizational workflow is widely used because it can use resources of different enterprises efficiently and therefore brings higher throughput. However, how to protect enterprises’ private business processes without affecting their ability to interact with other partners is an important issue in cross-organizational workflow. Workflow views are considered a promising approach to selectively hide details of private workflows, while providing a process-oriented interface. The concept of active workflow view was introduced, a framework for cross-organizational workflow monitoring based on active workflow view was proposed, and the active monitoring in cross-organizational workflows was discussed.
Related Articles | Metrics
Construction and validation of optimal diffusion layers in SPN block cciphers
CUI Ling-guo,CAO Yuan-da
Journal of Computer Applications    2005, 25 (04): 856-858.   DOI: 10.3724/SP.J.1087.2005.0856
Abstract1042)      PDF (126KB)(1226)       Save

Most of diffusion layers are linear transformations on the vector space GF(2 m) n for SPN structures, which correspond to n-rank matrices under certain bases. The diffusion layers in which branch numbers B equals n+1 are optimal, iff their corresponding matrices have no singular square submatrices. An algorithm was proposed to construct optimal linear layers. In order to validate the optimization of diffusion layers, an algorithm was provided. As an example, a optimal linear mapping over GF(2 8) 8 and its optimization-validation were presented.

Related Articles | Metrics